SLIDE 1 Tutorial: Security of quantum key distribution: approach from complementarity
QCrypt2020: Aug. 12, 2020
- Univ. of Tokyo Masato Koashi
SLIDE 2 0100101 0100111 Sifted key 0100101 0100101 ??0?1?? 0101 0101 ????
Quantum key distribution (QKD)
Estimating the amount of leak from observed test data Alice Bob Eve Shortening the key to remove the leaked portion Sifted key Final key Final key
Weak light pulses
Privacy amplification
Public communication
measurement
signals tests
Error correction
Optical channel
SLIDE 3
Explain how we can prove the security of QKD protocols against general attacks, focusing on the approach with βphase errors,β
Aim of this tutorial
which dates back to Mayers, Shor and Preskill. PART I: Methodology PART II: Protocols
Step 1: Perfect world (Basic idea) Step 2: Almost perfect world (Composable security) Step 3: Practical world (Privacy amplification) BB84 B92 TF-QKD RRDPS DM-CV QKD
SLIDE 4
STEP 1: Perfect world
SLIDE 5 π¨ 0101 π¨β² 0101
Goal of QKD
Alice Bob Eve Final key Final key
Ideal property of the final key
γ»Correlation-free γ»Uniformly distributed γ»Error-free πΏ bits πΏ bits Quantum description π
, ππ¨, π¨ π¨β©β¨π¨
β π¨β²β©β¨π¨β² β ππ¨, π¨ π
, 2 π¨β©β¨π¨
- β π¨β©β¨π¨ β π
General state: Ideal state: π π¨, π¨ π βπ¨, π¨β² π π¨, π¨ 0 whenever π¨ π¨β² Quantum System E β π π¨, π¨ β π π¨, π¨
SLIDE 6 π¨ 0101 π¨β² 0101
Dividing the requirement
Alice Bob Eve Final key Final key
Ideal property of the final key
γ»Correlation-free γ»Uniformly distributed γ»Error-free πΏ bits πΏ bits
π
, ππ¨ π¨β©β¨π¨
π
, 2 π¨β©β¨π¨
Property of π
,: Trπ ,
Ideal state: π π¨, π¨ π βπ¨, π¨β² Prob π¨, π¨ 0 whenever π¨ π¨β² Quantum System E Secrecy (for Alice) π π¨ π βπ¨ Correctness Prob π¨ 2 General state: Overall security π π¨, π¨ 0 whenever π¨ π¨β² β π π¨, π¨ β π π¨, π¨
SLIDE 7 Starting point: Cases when it is obviously secure
π
, 2 π¨β©β¨π¨
|οΌβ© |0β© |1β©/ 2
1
X basis eigenstate (a pure state) Z basis measurement γ»Correlation-free γ»Uniformly distributed If system A is in a pure state, it has no correlation to another system. If system A has non-zero correlation to another system, it is in a mixed state.
contrapositive H/V polarization Circularly polarized photon 1/2-Spin particle pointing (+x) direction A single photon fed to one input port Output ports of a half beam splitter Z component of spin
In what situation are we sure of achieving the ideal state?
SLIDE 8 Starting point: Cases when it is obviously secure
π
, 2 π¨β©β¨π¨
|οΌβ© |0β© |1β©/ 2 γ»Correlation-free γ»Uniformly distributed
1 1
π
,
Let us define the outcome β0000000β as βsuccessβ. Any other outcome is a failure. In what situation are we sure of achieving the ideal state?
SLIDE 9 Starting point: Cases when it is obviously secure
π
, 2 π¨β©β¨π¨
γ»Correlation-free γ»Uniformly distributed
1 1
π
,
Let us define the outcome β0000000β as βsuccessβ. Any other outcome is a failure. ? ? ? ? ? If there is a promise that the failure probability is zero, π
, π ,
In what situation are we sure of achieving the ideal state?
SLIDE 10 So what?
π
, 2 π¨β©β¨π¨
|οΌβ© |0β© |1β©/ 2
1 1
π
,
Bob: βWell, Iβd be happy to see Aliceβs key is secret, but the thing is, I donβt know her key eitherβ¦β In what situation are we sure of achieving the ideal state? Alice: βI am a sender of optical pulses. I see no qubits in my transmitter.β
SLIDE 11
Converting a sender to a receiver
Alice: βI am a sender of optical pulses. I see no qubits in my transmitter.β 1 Actual transmitter An entangled state
+
1 2 1 2
=
Probability 50% Probability 50%
A horizontally polaraized photon A vertically polarized photon
1 Equivalent Cases with a larger number of states, mixed states, and different probabilities are the same, except that the size of virtual quantum system may be larger. Then a qubit can be defined in a security proof.
SLIDE 12 Freedom of Z rotation
1 1
π
,
? ? ? ? ? If there is a promise that the failure probability is zero, π
, π ,
1 1
π
,
? ? ? ? ? Z axis rotations
Operations that commute with for every qubit
π β 0β©β¨0 1β©β¨1
βZ-preservingβ operations
Bob: βWell, Iβd be happy to see Aliceβs key is secret, but the thing is, I donβt know her key eitherβ¦β
SLIDE 13 Freedom of Z rotation
1 1
π
,
? ? ? ? ? If there is a promise that the failure probability is zero, π
, π ,
Z axis rotations are freely allowed to decrease the failure probability. Bob: βWell, Iβd be happy to see Aliceβs key is secret, but the thing is, I donβt know her key eitherβ¦β
SLIDE 14 Entanglement
1 1
π
,
= +
1 2 1 2
= +
1 2 1 2 Bob Bob
1 1 1 1
instruction Secrecy (for Alice) Correctness
SLIDE 15 Security from complementarity
1 1
π
,
1 1
Bob tries to guess Aliceβs final key If there is a promise that the failure probability is zero, π
, π ,
Bob tries to help resetting Aliceβs qubits to 0 on X basis
SLIDE 16 Security from complementarity
1 1
π
,
1 1
Bob tries to guess Aliceβs final key Bob tries to help resetting Aliceβs qubits to 0 on X basis
Classical channel
Both tasks are perfectly feasible πΏ ebits of entanglement
MK, arXiv:0704.3661
SLIDE 17 Security from complementarity
1 1
π
,
1 1
Bob tries to guess Aliceβs final key If there is a promise that the failure probability is zero, π
, π ,
Bob tries to help resetting Aliceβs qubits to 0 on X basis Aβ²
Quantum channel βZ-preservingβ operations
MK, New J. Phys., 11, 045018 (2009); MK, arXiv:0704.3661
SLIDE 18 Security from complementarity
1 1
π
,
1 1
Bob tries to guess Aliceβs final key Bob tries to help resetting Aliceβs qubits to 0 on X basis Erasing info on Aliceβs final key Learning Aliceβs final key Bob has a choice between a pair of mutually exclusive tasks
SLIDE 19
STEP 2: Almost perfect world
SLIDE 20 Small imperfection
1 1
π
,
1 1
Bob tries to guess Aliceβs final key If there is a promise that the failure probability is π, π
, is close to π ,.
Bob tries to help resetting Aliceβs qubits to 0 on X basis Aβ² We want a theorem looking like
SLIDE 21 Measure of imperfection
π
, ππ¨, π¨ π¨β©β¨π¨
β π¨β²β©β¨π¨β² β ππ¨, π¨ π
, 2 π¨β©β¨π¨
- β π¨β©β¨π¨ β π
Actual state: Ideal state: Proper measure of closeness? A standard measure in QKD (Universal composable security) 1 2 π
, π ,
π΅π΅ γ»Use of trace distance Monotonicity: π π Ξ π Ξ π
for any CPTP map Ξ.
Triangle inequality: π π π π π π γ»Specification of π π Tr π
, Tr π , ππ¨, π¨
ππ¨, π¨ γ»Regard system E as βeverythingβ, not just an adversaryβs system.
(As long as you are proving security against general attacks, you donβt have to worry about this difference.)
Ben-Or, M. Horodecki, Leung, Mayers, Oppenheim, in Proc. 2nd Theory Cryptogr. Conf., 3378, 386 (2005)
SLIDE 22 Universal composable security
Actual QKD protocol π¨ π¨β²
Interaction with Quantum channel
πΏ
Key length Public Announcement Final key Final key
Ideal QKD protocol π¨β²β² π¨β²β²
Interaction with Quantum channel
πΏ
Key length Public Announcement Final key Final key
Actual QKD protocol π¨ π¨β² π¨β²β² π¨β²β²
Ideal key Ideal key
SLIDE 23 Actual protocol Ideal protocol State of the gray area: π π
The protocol is πβsecure: It is guaranteed that
1 2 π π
π
For any event in the future, Monotonicity: π π Ξ π Ξ π
- Prob ππ€πππ’ actual Prob ππ€πππ’ ideal
π
Universal composable security
SLIDE 24 State of the gray area: π π
,
,
, ππ¨, π¨ π¨β©β¨π¨
β π¨β²β©β¨π¨β² β ππ¨, π¨ 2 π¨β²β²β©β¨π¨β²β²
β π π¨, π¨
π π¨, π¨ π
,
Actual protocol Ideal protocol π¨β² π¨ πΏ πΏ π¨β²β² π¨β²β² Tr π
, Tr π ,
Universal composable security
SLIDE 25 State of the gray area: π π
,
,
- A QKD protocol is πβsecure if
1 2 π
, π ,
2 π
, π ,
Ideal protocol π¨β² π¨ πΏ πΏ π¨β²β² π¨β²β²
Universal composable security
SLIDE 26
πβsecure protocol πβ²βsecure protocol πβsecure protocol Ideal protocol π ideal protocol Ideal protocol π ?
Universal composable security
SLIDE 27
πβsecure protocol πβ²βsecure protocol πβsecure protocol Ideal protocol π ideal protocol Ideal protocol π ? πβ²
Universal composable security
SLIDE 28
πβsecure protocol πβ²βsecure protocol πβsecure protocol Ideal protocol π ideal protocol Ideal protocol π ? πβ² π
Universal composable security
SLIDE 29 πβsecure protocol πβ²βsecure protocol πβsecure protocol Ideal protocol Triangle inequality: π π π π π π π ideal protocol Ideal protocol π 1 2 π π
π πβ²
π πβ² πβ² π
Universal composable security
SLIDE 30 Dividing the requirement
Imperfection of the final key
Prob π¨ π¨ πβ²β² Secrecy (for Alice) Correctness Overall security (πβsecure) 1 2 π
, π ,
1 2 π
, π ,
- πβ² (πβ²βsecret)
(πβ²β²βcorrect) With π πβ+ πββ
π
, ππ¨ π¨β©β¨π¨
π
, 2 π¨β©β¨π¨
π
, 2 π¨β©β¨π¨
- β π¨β©β¨π¨ β π
π
, ππ¨, π¨ π¨β©β¨π¨
β π¨β²β©β¨π¨β² β ππ¨, π¨ ππ¨, π¨ π¨β©β¨π¨
β π¨β©β¨π¨ β ππ¨, π¨ πβ² πβ² πβ²β²
SLIDE 31
Small imperfection
1 1 1 1
Bob tries to guess Aliceβs final key If there is a promise that the failure probability is π, the protocol is πβsecret. Bob tries to help resetting Aliceβs qubits to 0 on X basis Aβ² We want a theorem looking like
SLIDE 32
Small imperfection
1 1 1 1
Bob tries to guess Aliceβs final key If there is a promise that the failure probability is π, the protocol is 2πβsecret. Bob tries to help resetting Aliceβs qubits to 0 on X basis Aβ² 2πβsecret Failure π
SLIDE 33 Relation between failure probability and secrecy
1 1
π
,
π failure: π
,
π
,
- β¨π
- ||οΌβ© β¨
- | |πβ©
οΌ π: Tr π
, Tr π ,
1 π Tr β¨
οΌ π
,|οΌβ©
π π
,
Tr Tr |πβ©
Hayashi, Tsurumaru, New J. Phys., 14, 093014 (2012).
SLIDE 34 Relation between failure probability and secrecy
1 1
π
,
π
,
π Trπ
,
1 1
π
,
π
,
- β¨π
- ||οΌβ© β¨
- | |πβ©
οΌ β¨
οΌ π
,|οΌβ©
π π
,
Tr Tr |πβ© π
,
|οΌβ© β¨
οΌ β π |οΌβ© |πβ© Tr π
,
|Ξ¦β© β |οΌβ© |πβ© Tr π
,
|Ξ¨β© β Ξ¦ Ξ¨
β¨π
β¨
οΌ
1 π 1 π Tr
Hayashi, Tsurumaru, New J. Phys., 14, 093014 (2012).
SLIDE 35 Relation between failure probability and secrecy
1 1
π
,
π
,
π Trπ
,
1 1
π
,
π
,
π π
,
Tr Tr |πβ© π
,
|οΌβ© β¨
οΌ β π |οΌβ© |πβ© Tr π
,
|Ξ¦β© β |οΌβ© |πβ© Tr π
,
|Ξ¨β© β Ξ¦ Ξ¨
β¨π
β¨
οΌ
1 π πΊπ
,, π ,
Ξ¦ Ξ¨
1 π 1 2π
1 2 π
, π ,
1 πΊ 2π 2π 2 π 2π
Hayashi, Tsurumaru, New J. Phys., 14, 093014 (2012).
SLIDE 36
Small imperfection
1 1 1 1
Bob tries to guess Aliceβs final key If there is a promise that the failure probability is π, the protocol is 2πβsecret. Bob tries to help resetting Aliceβs qubits to 0 on X basis Aβ² 2πβsecret Failure π
SLIDE 37
STEP 3: Practical world
SLIDE 38 Small imperfection
1 1 1 1
Bob tries to guess Aliceβs final key Bob tries to help resetting Aliceβs qubits to 0 on X basis 2πβsecret This scenario works if entanglement distillation is actually carried out. πβ²β²βcorrect Failure π
Lo, Chau, Science, 283, 2050 (1999).
SLIDE 39
Realistic cases
1 1 1 1
Bob tries to guess Aliceβs sifted key β
1 Failure
1 1
Bob tries to help resetting Aliceβs qubits to 0 on X basis insecure Bit errors Phase errors Sifted key (N bits)
SLIDE 40 Realistic cases
1 1 1 1
Bob tries to guess Aliceβs sifted key
1 1
Bob tries to help resetting Aliceβs qubits to 0 on X basis A promise on statistical property
Sifted key (N bits) Privacy amplification Final key (K bits)
1
πβsecret What we want: e.g. The number of phase errors ππ except a small probability π
SLIDE 41 Realistic cases
1 1 1 1
Bob tries to guess Aliceβs sifted key
1 1
Bob tries to help resetting Aliceβs qubits to 0 on X basis A promise on statistical property
Sifted key (N bits) Privacy amplification Final key (K bits)
1
What we want: e.g. The number of phase errors ππ except a small probability π πΌ bits πβsecret In this talk, we assume that Alice helps Bob by sending πΌ bits of encrypted message, by consuming as many bits of secret key. The net key gain of the QKD protocol is π» πΏ πΌ.
SLIDE 42
Privacy amplification
Sifted key Privacy amplification Final key (Bob also applies the same procedure to his sifted key.) Final key (K bits) Sifted key (N bits)
1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1
A randomly chosen matrix N qubits
SLIDE 43 Approach with leftover hashing lemma
Sifted key Privacy amplification Final key Final key (K bits) Sifted key (N bits)
1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1
A randomly chosen matrix N qubits Eveβs quantum system
Renner (2005)
πΌ
Tsurumaru, IEEE Trans. Inf. Theory, 66, 3465 (2020).
Leftover hashing lemma Relations between the two approaches Bobβs quantum system
SLIDE 44
Privacy amplification
Sifted key Privacy amplification Final key Final key (K bits) Sifted key (N bits)
1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1
A randomly chosen matrix N qubits
SLIDE 45 Privacy amplification
Sifted key Privacy amplification Final key
1 1
1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Quantum circuit
(Z basis) N qubits Final key (K bits) K qubits
SLIDE 46 Example: a controlled-NOT gate
Matrix π· Matrix π·
1 1 = 1 1 1 1
The same quantum circuit
1 1 = 1 1 1 1
SLIDE 47 Privacy amplification
1 1
1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Quantum circuit
(Z basis) N qubits Final key (K bits) K qubits
SLIDE 48 Privacy amplification
N qubits K qubits
1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Quantum circuit
(X basis)
1 1
e.g.
A promise on statistical property of phase error patterns πβ
The number of phase errors ππ except a small probability π
2πβsecret failure π Privacy amplification to K bits Phase error correction via (N-K) bits of hints On Z basis: On X basis: πβ
SLIDE 49 Number of possible phase error patterns (Nβbit string πβ)
The number of phase errors ππ
Amount of privacy amplification (Rough)
N qubits K qubits
1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Quantum circuit
(X basis)
1 1
e.g.
2πβsecret failure π
2
πΌ πβπ
β π¦ β π¦logπ¦ 1 π¦ log1 π¦
Every bit halves the number of candidates. Phase error correction will succeed if πΌ π πΏ Secure final key length πΏ β
π πΌ πβ
SLIDE 50 One can choose a candidate set π of probable phase error patterns such that
Amount of privacy amplification (Strict)
N qubits K qubits
1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Quantum circuit
(X basis)
1 1
2πβsecret failure π
|π| 2
πβ Prob πβ β π 1 π Every wrong candidate in π is eliminated except probability 2 Choose the final key length πΏ as πΏ π πΌ π‘ failure π 2 π π 2 π
SLIDE 51 Finite-size security
1 1 1 1
Bob tries to guess Aliceβs sifted key
1 1
Bob tries to help resetting Aliceβs qubits to 0 on X basis Sifted key (N bits) Privacy amplification Final key (K bits)
1
π
,
πβsecret The protocol is
with π 2 2 π
|π| 2
Prob πβ β π 1 π πΏ π πΌ π‘ or 0 πβ
SLIDE 52 Recipe
1 1 1
Aliceβs sifted key
1 1 1 1 1
Bob Eve Eve
?
- 1. Rewrite the protocol such that Aliceβs sifted key is the Z values of qubits.
- 2. Find what Bob could have done to help reducing phase errors.
(It must be compatible to Bobβs announcement)
- 3. Compute a bound on the number of phase error patterns.
SLIDE 53 Remarks
βPhase error probabilityβ or βPhase error rateβ π in the asymptotic limit Number of phase errors
ππ π
- except probability π
- π
, π β 0 for π β β
πΌ πβπ π
π 1 β π π
π β 1 β π Asymptotic efficiency of privacy amplification
SLIDE 54 Remarks
1 1 1 1
Eve
?
Sifted key bits are tagged and classified: π β π
- Phase error probability π
depending on the tag value π’
π’ 0 π’ 1 π’ 0 π’ 1 π’ 0
π π β π
Number of phase error patterns: βΌ β 2^π β π
- πΌ βΌ π β π
- πΏ
π β 1 π
β π
Gottesman, Lo, Lutkenhaus, Preskill, Quant. Inf. Comput. 5, 325 (2004).
SLIDE 55
PART II: Protocols
SLIDE 56 Ideal BB84 protocol
0101β¦ Alice Bob Eve 1 1 1 Sifted key
Signal Test
+
1 2 1 2
=
Assumption: Detection probability has no dependence on the basis, for any input.
Signal Test
Announcement
SLIDE 57 +
1 2 1 2
Ideal BB84 protocol
0101β¦ Alice Bob Eve Sifted key
=
1
Signal Test
Assumption: Detection probability has no dependence on the basis, for any input.
Signal Test
Announcement
SLIDE 58 Ideal BB84 protocol
Alice Bob Eve
+
1 2 1 2
= +
1 2 1 2
=
1
Signal Test
Assumption: Detection probability has no dependence on the basis, for any input.
Signal Test
Announcement
SLIDE 59
Ideal BB84 protocol
1 1 1
Aliceβs sifted key
1 1
Bob Eve Eve
?
SLIDE 60
Ideal BB84 protocol
1 1 1
Aliceβs sifted key
1 1 1 1 1
Bob Eve Eve
1 1
Eve
Test mode Signal mode
SLIDE 61 Ideal BB84 protocol
Alice Bob Eve 1
Signal Test
Assumption: Detection probability has no dependence on the basis, for any input.
Signal Test
Fair sampling Errors found in the test mode are fair sampling of phase errors Asymptotic key length: πΏ βΌ π1 β π Finiteβsize: classical sampling theory is enough. Simple random sampling
A fixed number of samples drawn
Bernoulli sampling
Hypergeometric distribution Samples drawn with a fixed probability Binomial distribution
π π π π π π π
Announcement
Kawakami, Sasaki, MK, Phys. Rev. A, 96, 012305 (2017).
SLIDE 62 BB84 protocol with phase-randomized laser pulses
A π ππ πβ©β¨π
Alice emits a phaseβrandomized pulse in a mode C π: number of photons π ππ πβ©β¨π πβ©β¨π
π
Trπ π
π
β π π
β π
1 π
β π
π
Tighter estimation of the parameters is done by decoyβstate technique.
Lo, arXiv:quantβph/0503004
SLIDE 63 Binary phase encoding
Alice Bob Eve 1 1 1
Signal
=
Ο Ο Ο Ο
+
1 2 1 2
= +
even
Schrodinger cat states
| π½β© | π½β©
Coherent states
Used in many protocols: B92, DPS, RRPDS, a Twin-field(PM), a DM-CV, β¦ cπ½ π‘π½
|π½β© |π½β©
c π½ π‘ π½ 1 π‘ π½ πsinh π½ π½ ππ½
Prob.of |γΌβ©, corresponding to the amount of information in the signal.
SLIDE 64 B92 protocol
0101β¦ Alice Bob Eve 1 1 1 Sifted key
Signal Test
Announcement
Ο Ο Ο Ο Ο
| π½β© | π½β© 1 | πΎβ©β¨πΎ| 2
Coherent states
1 |οΌπΎβ©β¨οΌπΎ| 2
πΎ β ππ½
Nominal received amplitude
Outcome 0: Outcome 1:
1 failure
B92 Outcome βfailureβ: c πΎ |πΎβ©πΎ| π‘ πΎ |πΎβ©πΎ| input LO
|οΌπΎβ© Photon detector
| πΎβ©
π: channel transmission
SLIDE 65 B92 protocol
1 1 1
Aliceβs sifted key
1 failure 1 1 1
Bob Eve Eve
?
B92 B92 B92 B92 B92
even even even
1 |πΎβ©
SLIDE 66 B92 protocol: Analysis of phase error probability
Basis: |οΌβ© |γΌβ© |πΎβ© |πΎβ© |ππ’βππ π‘β© Phase error No Phase error |γΌβ© |οΌβ© |πΎβ© |πΎβ© |οΌβ© |γΌβ©|ππ’βππ π‘β© |ππ’βππ π‘β© 1 |πΎβ© |πΎβ© |γΌβ© |οΌβ©|πΎβ© Bit error:1/2 Bit error:1/2 Probability of
π‘ π½ π‘ πΎ π πΎ 1 2
1 |γΌβ©
Tamaki, MK, Imoto, Phys. Rev. Lett., 90, 167904 (2003), MK, Phys. Rev. Lett., 93, 120501 (2004)
SLIDE 67 B92 protocol: Analysis of phase error probability
Basis: |οΌβ© |γΌβ© |πΎβ© |πΎβ© |ππ’βππ π‘β© Phase error No Phase error |γΌβ© |οΌβ© |πΎβ© |πΎβ© |οΌβ© |γΌβ©|ππ’βππ π‘β© |ππ’βππ π‘β© 1 |πΎβ© |πΎβ© |γΌβ© |οΌβ©|πΎβ© Bit error:1/2 Bit error:1/2
π‘ π½ π‘ πΎ π πΎ 1 2
If bit error prob. is zero β¦. Only the two states are allowed. The average must be the initial value π‘ π½ , since Eve cannot touch Aliceβs qubit. Phase error probability is π π‘ π½ πΎ
- (consistent with beam splitting attack)
1 Probability of |γΌβ©
MK, Phys. Rev. Lett., 93, 120501 (2004)
SLIDE 68 B92 protocol: Analysis of phase error probability
Basis: |οΌβ© |γΌβ© |πΎβ© |πΎβ© |ππ’βππ π‘β© Phase error No Phase error |γΌβ© |οΌβ© |πΎβ© |πΎβ© |οΌβ© |γΌβ©|ππ’βππ π‘β© |ππ’βππ π‘β© 1 |πΎβ© |πΎβ© |γΌβ© |οΌβ©|πΎβ© Bit error:1/2 Bit error:1/2
π‘ π½ π‘ πΎ π πΎ 1 2
Given Bit error prob. Detection prob. Compute the worst phase error prob. 1 Asymptotic: Finiteβsize: Azumaβs inequality Probability of |γΌβ©
SLIDE 69 Twin-Field QKD
Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).
Untrusted (taken over by Eve)
Ο
Only uses lasers, linear optics, and photon detectors.
SLIDE 70 Expected key rate scaling in TF-QKD
Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).
It is expected that the achievable distance is doubled.
Pirandola, Laurenza, Ottaviani & Banchi., Nat.
SLIDE 71 Twin-Field QKD
Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).
Alice Bob
- cf. A prepareβandβmeasure QKD
Detection!
A photon travels only half the distance between Alice and Bob.
SLIDE 72 Twin-Field QKD
Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).
Alice Bob Detection!
A photon travels only half the distance between Alice and Bob.
- cf. A prepareβandβmeasure QKD
SLIDE 73 Twin-Field-type QKD
0101β¦ Alice Bob 1 1 1 Sifted key
Signal
Ο Ο Ο
| π½β© | π½β©
βPhaseβMatchingβ protocol
Ma, Zeng & Zhou, Phys. Rev. X 8, 031043 (2018).
Announcement: Detected (in phase/out of phase) Failed Eve/ Charlie
Test mode: Many variants of PM protocols
Ο Ο
SLIDE 74 TF-type QKD (PM protocol)
1 1 1
Aliceβs sifted key
1 1
Bob Eve/ Charlie
even even even
even
even even
1 1 1
Eve/ Charlie
1 1 1
(Only the detected rounds are shown) even even
results in a phase error. The cases with
SLIDE 75 Alice Bob 1
Signal
Ο
| π½β© | π½β©
Announcement: Detected (in phase/out of phase) Failed Eve/ Charlie
Test mode:
TF-type QKD (PM protocol)
even even
=
π β c π½ c π½ π‘ π½ π 1 π |π½β© |π½β© |π½β© |π½β© Phase error probability Estimation of detection rate of (by only using coherent states) Asymptotic: Many designs proposed. Finiteβsize: γ»Reduction to Bernoulli sampling (Operation dominance method) γ»(Improved version of) Azumaβs inequality
1) Maeda, Sasaki, MK, Nat. Commun. 10, 3140 (2019). 2) Lorenzo, Navarrete, Azuma, Curty, Razavi, arXiv:1910.11407. 3) Kato, arXiv:2002.04357. 1) 3) 2)
SLIDE 76 Alice
Ο Ο Ο
detection 1 2 3 4 5 6 1 2 3 4 5 6
π, π 3,5
1
β¦
VD
Bob Variable delay 1 1
π, π 3,5
1 1 β 0 1 Aliceβs sifted key bit Bobβs sifted key bit
Ο
| π½β© | π½β©
Block of π pulses
Sasaki, Yamamoto, MK, Nature 509 509, 475 (2014).
Round Robin DPS QKD
SLIDE 77 Security from complementarity
1 1
π
,
1 1
Bob tries to guess Aliceβs final key Bob tries to help resetting Aliceβs qubits to 0 on X basis Erasing info on Aliceβs final key Learning Aliceβs final key Bob has a choice between a pair of mutually exclusive tasks
SLIDE 78
What is the working principle of QKD?
Alice Bob Eve Law of quantum mechanics
Conventional QKD RRDPS QKD
Nothing to do with quantum Eveβs attempts to eavesdrop should leave a trace, which can be monitored. Alice Bob Eve Eve has only a small chance to read out the bit, just because the signal is weak. Law of quantum mechanics
SLIDE 79 Round Robin DPS QKD
Alice
Ο Ο Ο
detection 1 2 3 4 5 6 1 2 3 4 5 6
π, π 3,5
1
β¦
VD
Bob Variable delay 1 1
π, π 3,5
1 1 β 0 1 Aliceβs sifted key bit Bobβs sifted key bit
Ο
| π½β© | π½β©
Block of π pulses
Sasaki, Yamamoto, MK, Nature 509 509, 475 (2014).
SLIDE 80 RRDPS QKD
Alice
Ο Ο Ο
1
β¦
VD
Bob Variable delay 1 1
π, π 3,5
1 1 β 0 1 Bobβs sifted key bit Block of π pulses
Assumption: Total number of photons is no larger than π 1 2 3 4 5 4 5 1 2 3
1 Assumption:
SLIDE 81 RRDPS protocol
1 1 1
Aliceβs sifted key
1 failure 1 1 1
Bob Eve Eve
?
β π β π β π β π β π β π β π β π β π β π β π β π β π β π β π β π β π β π β π β π
SLIDE 82 RRDPS QKD
π, π 3,5 π pulses sifted key bit
β π β π
π π 1
1 2 3 4 5 detection 4 5 1 2 3
SLIDE 83 RRDPS QKD
π pulses phase error
β π β π
π π
1 1
1
1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than π
No more than π qubits are in state π, π 3,5
SLIDE 84 RRDPS QKD
π pulses
β π β π
π π
1 1
1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than π
No more than π qubits are in state π, π 3,5
detection
The index π is uniformly random.
Probability of phase error
π π 1 phase error
SLIDE 85 RRDPS QKD
π pulses
β π β π
π π
1 1
1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than π
No more than π qubits are in state π, π 3,5
detection
The index π is uniformly random.
Probability of phase error
π π 1 phase error
SLIDE 86 RRDPS QKD
π pulses
β π β π
π π
1 1
1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than π
No more than π qubits are in state π, π 3,5
detection
The index π is uniformly random.
Probability of phase error
π π 1 phase error
SLIDE 87 RRDPS QKD
π pulses
β π β π
π π
1 1
π, π 3,5
Probability of phase error
π π 1 phase error Asymptotic key length: πΏ βΌ π πβ π π 1 Finiteβsize: No sampling needed. Just a Bernoulli trial.
SLIDE 88
What is the working principle of QKD?
Alice Bob Eve Law of quantum mechanics
Conventional QKD RRDPS QKD
Nothing to do with quantum Eveβs attempts to eavesdrop should leave a trace, which can be monitored. Alice Bob Eve Eve has only a small chance to read out the bit, just because the signal is weak. Law of quantum mechanics
SLIDE 89
CV-QKD
LASER
signal photodetector photodetector
γΌ
Homodyne/Heterodyne detection Continuous-variable QKD CV-QKD was off limits to the phase error approach.
SLIDE 90 A two-state CV-QKD protocol
1
Signal Test
Ο Ο
| π½β© | π½β©
Coherent states
1 | πΎβ©β¨πΎ| 2 1 |οΌπΎβ©β¨οΌπΎ| 2
πΎ β ππ½ Outcome 0: Outcome 1:
1 failure
B92 The B92 measurement has two roles. Signal: Selecting out only favorable events. π¦
Acceptance probability
1 β0β β1β βfailureβ
Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.
SLIDE 91 2-state CV protocol
1 1 1
Aliceβs sifted key
1 failure 1 1 1
Bob Eve Eve
?
even even even
SLIDE 92 2-state CV protocol
1 1 1
Aliceβs sifted key
1 failure 1 1 1
Bob Eve Eve
even even even
e/o e/o e/o e/o e/o e/o Parity of the photon number
SLIDE 93 A two-state CV-QKD protocol
1
Signal Test
Ο Ο
| π½β© | π½β©
Coherent states
1 | πΎβ©β¨πΎ| 2 1 |οΌπΎβ©β¨οΌπΎ| 2
πΎ β ππ½ Outcome 0: Outcome 1:
1 failure
B92 The B92 measurement has two roles. Signal: Selecting out only favorable events. Test: Estimation of bit error probability β¨οΌπΎ|π|οΌπΎβ© Estimation of fidelities of the received state β¨πΎ|π| πΎβ©
Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.
SLIDE 94 Fidelity estimation via Heterodyne measurement
Ξ, π β π 1 π π
1 π π
Associated Laguerre polynomial
π½Ξ, π β¨0|π|0β©
π β β: Outcome of Heterodyne measurement π: input state The equality holds when π has π or fewer photons.
π½Ξ, π πΎ β¨πΎ|π| πΎβ©
π: odd integer
Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.
SLIDE 95 Ξ, π is bounded and smooth
Security proof of 2-state CV-QKD
β Finite-size security β Against general attack
(AzumaΚΌs inequality)
β Finite measurement precision β Finite constellation
Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.